Threat Landscape Summary (24 November – 1 December, 2025)
The week of November 24 to December 1, 2025, coincided with the global “Black Friday” and “Cyber Monday” shopping window, resulting in an unprecedented spike in retail-focused cybercrime and logistical supply chain disruption. While consumer-facing phishing dominated the volume of attacks, the most severe impacts were felt in the telecommunications and shipping sectors, where “Clop” and “Black Shrantac” successfully weaponized infrastructure vulnerabilities to exfiltrate multi-terabyte datasets.
Key Highlights:
The global threat landscape shifted toward high-velocity consumer data harvesting. Threat actors leveraged the seasonal increase in digital transactions to mask their traffic, with a particular focus on bypassing “3D Secure” authentication via sophisticated adversary-in-the-middle (AiTM) phishing kits.
Key Observations:
T-Mobile (Telecom): On November 26, the company confirmed a breach via an external API. Attackers accessed PII, including names, billing addresses, and partial SSNs for 2.1 million customers.
FedEx Express (Logistics): A targeted campaign by the “GENESIS” ransomware group disrupted manifest processing in European hubs. While no encryption was reported, the group claims to have stolen 4.2TB of internal routing and customer data.
Mercado Libre (E-commerce): The Latin American giant reported an unauthorized intrusion into its source code repositories, potentially exposing internal security protocols and proprietary fraud-detection algorithms.
Sony Interactive Entertainment (Media/Gaming): A major leak surfaced on November 28, allegedly containing employee records and future product roadmaps. The breach is currently being attributed to a vulnerability in a legacy file-transfer server.
Decathlon (Retail): The global sports retailer disclosed a misconfigured database that exposed over 5 million customer records including purchase histories and encrypted passwords.
| Date | Affected Organization | Sector | Incident Type | Impact |
| Nov 24, 2025 | Sony (SIE) | Media | Extortion | Employee data & product roadmaps leaked |
| Nov 26, 2025 | T-Mobile | Telecom | API Breach | 2.1M customer records exposed |
| Nov 27, 2025 | Decathlon | Retail | Cloud Leak | 5M records (PII/Purchases) |
| Nov 28, 2025 | FedEx Express | Logistics | Data Extortion | 4.2TB of sensitive manifest data |
| Nov 30, 2025 | Mercado Libre | E-commerce | Source Code Theft | Internal repositories compromised |
| Dec 01, 2025 | British Airways | Aviation | Phishing/AiTM | Thousands of customer sessions hijacked |
The “SilentSeller” Stealer:
A new malware family, dubbed “SilentSeller,” emerged this week specifically targeting small-to-medium business (SMB) web-store owners. Unlike traditional stealers that target consumer credit cards, SilentSeller exfiltrates browser cookies and session tokens for merchant dashboards, allowing attackers to hijack entire storefronts to redirect payments.
AI-Enhanced Magecart:
Traditional Magecart scripts are being replaced by “Dynamic Skimmers.” These scripts use a small LLM-based module to identify the specific structure of a checkout page in real-time and inject fields that perfectly mimic the site’s CSS, making them nearly invisible to manual code reviews.
| CVE ID | Description | Severity | Mitigation Status |
| CVE-2025-66002 | Cisco AnyConnect VPN RCE: Unauthenticated buffer overflow in the web-management portal. | 9.8 (Critical) | Extreme Risk. Actively used for initial access. |
| CVE-2025-65001 | Google Chrome Type Confusion: Zero-day in V8 engine exploited in the wild. | 9.1 (Critical) | Update to version 131.0.6778.x or later. |
| CVE-2025-62215 | Windows Kernel EoP: Persistent exploitation of race condition. | 7.0 (High) | Final warning: Unpatched systems are being targeted by “Oyster.” |
| CVE-2025-64900 | Ivanti Connect Secure SSRF: Allows unauthenticated access to internal resources. | 9.4 (Critical) | Apply emergency XML mitigation and patch. |
explorer.exe process.For Technical Audiences:
The convergence of Holiday Phishing and Infrastructure Zero-Days (Cisco, Ivanti) has created a high-risk environment for the first half of December. We anticipate that groups like “Black Shrantac” will release more stolen datasets from logistics companies in the coming days to pressure victims into payment before the end of the fiscal year. Organizations should maintain “Maximum Alert” status for their external-facing VPNs and ensure that any legacy APIs are decommissioned before the holiday staff shortage begins.
Meraal Cyber Security (MCS) Threat Intelligence Team